Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7558

Опубликовано: 26 июл. 2018
Источник: debian
EPSS Низкий

Описание

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.12.13-1package
linuxfixed4.9.30-2+deb9u5stretchpackage
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

EPSS

Процентиль: 73%
0.00798
Низкий

Связанные уязвимости

CVSS3: 5.1
ubuntu
почти 7 лет назад

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.

CVSS3: 5.1
redhat
почти 8 лет назад

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.

CVSS3: 5.1
nvd
почти 7 лет назад

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.

CVSS3: 7.5
github
около 3 лет назад

A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.

CVSS3: 7.5
fstec
почти 8 лет назад

Уязвимость реализации стека протоколов SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать утечку памяти

EPSS

Процентиль: 73%
0.00798
Низкий